Wenn herkömmliche Cyberangriffe an ihre Grenzen stoßen, greifen Hacker auf Social Engineering zurück. Durch die gezielte Manipulation von Mitarbeitern entstehen jährlich Schäden in Milliardenhöhe. Dabei können IT-Manager bereits mit einfachen Methoden das Risiko minimieren.
Quelle: Sicherheitslücke Mensch
The Drivetrain Approach: A four-step process for building data products.
Quelle: Designing great data products
For many of us the term data breach conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate the more likely we are to shift focus from outsider hackers to insider threats.
Quelle: Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines
IT security professionals will tell you that the bulk of spending on cybersecurity in large organizations in recent years has been toward perimeter tools like firewalls. And yet the relentless pace of major data breaches has shown no signs of letting up.
Quelle: Can User Behavior Analytics Do a Better Job of Protecting Your Organization’s Data?
Online scams targeting credit unions and other financial institutions are evolving into social engineering.
Quelle: Social Engineering Scams Evolve & Threaten Financial Institutions
Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company’s network.
Quelle: How to eliminate insider threats
Value the employee, and they’ll understand your cybersecurity awareness
Quelle: Value the employee, and they’ll understand your awareness
OPINION | „A response, cyber and otherwise is a necessity.“
Quelle: Russian cyber behavior: Where, when, and how to retaliate
So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents. When it comes to automation, security platforms will devise and execute controls based on newly detected threats and do it without human intervention. That reduces the time between a compromise and the time the threat is neutralized – reducing the time window when attackers can do damage.
Quelle: The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence
Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases — but even as the defensive technologies are getting better, attackers are finding ways to get around them
Quelle: Hackers get around AI with flooding, poisoning and social engineering